White Papers

Implementation Information..........................................................................................................................................279
Congure the System to be a DHCP Server..............................................................................................................279
Conguring the Server for Automatic Address Allocation..................................................................................280
Specifying a Default Gateway.................................................................................................................................281
Congure a Method of Hostname Resolution...................................................................................................... 281
Using DNS for Address Resolution.........................................................................................................................281
Using NetBIOS WINS for Address Resolution......................................................................................................282
Creating Manual Binding Entries............................................................................................................................282
Debugging the DHCP Server................................................................................................................................. 282
Using DHCP Clear Commands...............................................................................................................................283
Congure the System to be a DHCP Client............................................................................................................... 283
Conguring the DHCP Client System................................................................................................................... 283
DHCP Client on a Management Interface............................................................................................................285
DHCP Client Operation with Other Features.......................................................................................................285
Congure the System for User Port Stacking (Option 230)....................................................................................286
Congure Secure DHCP...............................................................................................................................................286
Option 82.................................................................................................................................................................. 287
DHCP Snooping....................................................................................................................................................... 287
Drop DHCP Packets on Snooped VLANs Only....................................................................................................292
Dynamic ARP Inspection.........................................................................................................................................292
Conguring Dynamic ARP Inspection................................................................................................................... 293
Source Address Validation............................................................................................................................................ 294
Enabling IP Source Address Validation..................................................................................................................294
DHCP MAC Source Address Validation................................................................................................................ 295
Enabling IP+MAC Source Address Validation.......................................................................................................295
Viewing the Number of SAV Dropped Packets................................................................................................... 296
Clearing the Number of SAV Dropped Packets...................................................................................................296
13 Equal Cost Multi-Path (ECMP)................................................................................................................ 297
ECMP for Flow-Based Anity..................................................................................................................................... 297
Conguring the Hash Algorithm.............................................................................................................................297
Enabling Deterministic ECMP Next Hop...............................................................................................................297
Conguring the Hash Algorithm Seed.................................................................................................................. 298
Link Bundle Monitoring................................................................................................................................................. 298
Managing ECMP Group Paths...............................................................................................................................299
Creating an ECMP Group Bundle..........................................................................................................................299
Modifying the ECMP Group Threshold................................................................................................................ 299
Support for /128 IPv6 and /32 IPv4 Prexes in Layer 3 Host Table and LPM Table......................................300
Support for ECMP in host table.............................................................................................................................301
Support for moving /128 IPv6 Prexes and /32 IPv4 Prexes .........................................................................301
14 FIP Snooping............................................................................................................................................302
Fibre Channel over Ethernet........................................................................................................................................ 302
Ensure Robustness in a Converged Ethernet Network............................................................................................302
FIP Snooping on Ethernet Bridges..............................................................................................................................304
Using FIP Snooping....................................................................................................................................................... 306
10
Contents